It is believed that Organizations around the world should be prepared for the transition to IPv6 and make sure they have the " know how" to be able to succeed in choosing the right migration to start time. This paper focuses on the transition to IPv6 mechanisms. Also, this paper proposes and tests a deployment of IPv6 prototype within the intranet of the University of Baghdad (BUniv) using virtualization software. Also, it deals with security issues, improvements and extensions of IPv6 network using firewalls, Virtual Private Network ( VPN), Access list ( ACLs). Finally, the performance of the obtainable intrusion detection model is assessed and compared with three approaches.
The research aims present to highlight the importance of creating construction Organizational appropriate to achieve strategic success and reduce many of the negative effects experienced by organizations has been developing his questionnaire especially so was distributed to a sample of workers in the Asia-cellular as sample included (60) responsive 0 and can embody intellectual dilemma following questions (What are the dimensions of the organizational infrastructure, and what are the justifications for carrying out the reform and development cleared the organizational structure to make it more flexible) to contribute to the achievement of the strategic requirements for success of the organization surveyed.
Find recommended a number o
the most important purposes and uses of the test results in the educational sector. This is because the quality of tests is related to their ability to predict the learner's behavior in the future, and the accuracy of the educational and administrative decisions that are taken in light of their results. The study aimed accordingly to reveal the predictive ability of the university Grade Point Average (GPA) in the Score of the specialized test for the position of teacher in the Ministry of Education in the Sultanate of Oman. It further aimed to investigate the differences in the predictive ability according to the specialization and academic year using the descriptive approach. The sample of the study consisted of (349) s/he students enro
... Show MoreLand use change, particularly the expansion of urban areas and associated human activities at the expense of natural and semi-natural areas, is a major ecological issue in urban areas around the world. Climate change being a very strong additional driver for changing the temperature and habitat in the cities. This also applies to Baghdad, Iraq, where urbanisation and climate change exerts a major pressure on the natural habitats of the city, and thus may affect the ability of city planners to adapt to future climate change scenarios. Here we present evidence of substantial growth in urban areas, increases in temperature, and degradation of natural vegetation within Baghdad city by using Remote Sensing techniques and an assessment for the
... Show MoreEnglish is spoken by its native speakers in two different forms. Reduced form which marks the colloquial and rapid speech so that it is easily produced and a citation or unreduced form which is a characteristic of careful, emphasized and slow speech.
This paper investigates Iraqi EFL university students’ production of the two forms mentioned above. The sample chosen includes twenty fourth year students, of which ten are males and the other ten are females from the Department of English of the College of Languages of the University of Duhok in Kurdistan Region of Iraq in the academic year 2020-2021. The material tested is six connective words which represent the commonest ones in every-day co
... Show MoreComputer systems and networks are being used in almost every aspect of our daily life; as a result the security threats to computers and networks have also increased significantly. Traditionally, password-based user authentication is widely used to authenticate legitimate user in the current system0T but0T this method has many loop holes such as password sharing, shoulder surfing, brute force attack, dictionary attack, guessing, phishing and many more. The aim of this paper is to enhance the password authentication method by presenting a keystroke dynamics with back propagation neural network as a transparent layer of user authentication. Keystroke Dynamics is one of the famous and inexpensive behavioral biometric technologies, which identi
... Show MoreImitation learning is an effective method for training an autonomous agent to accomplish a task by imitating expert behaviors in their demonstrations. However, traditional imitation learning methods require a large number of expert demonstrations in order to learn a complex behavior. Such a disadvantage has limited the potential of imitation learning in complex tasks where the expert demonstrations are not sufficient. In order to address the problem, we propose a Generative Adversarial Network-based model which is designed to learn optimal policies using only a single demonstration. The proposed model is evaluated on two simulated tasks in comparison with other methods. The results show that our proposed model is capable of completing co
... Show MoreIn this paper, wireless network is planned; the network is predicated on the IEEE 802.16e standardization by WIMAX. The targets of this paper are coverage maximizing, service and low operational fees. WIMAX is planning through three approaches. In approach one; the WIMAX network coverage is major for extension of cell coverage, the best sites (with Band Width (BW) of 5MHz, 20MHZ per sector and four sectors per each cell). In approach two, Interference analysis in CNIR mode. In approach three of the planning, Quality of Services (QoS) is tested and evaluated. ATDI ICS software (Interference Cancellation System) using to perform styling. it shows results in planning area covered 90.49% of the Baghdad City and used 1000 mob
... Show MoreObjective: To determine the prevalence of bullying among primary schools’ children with some associated factors, and resultant effects. Methodology: This cross-sectional study with analytic elements was carried out from February through April 2022. It included a sample of 410 students from six governmental primary schools from both sides of Baghdad city. A self-constructed questionnaire was used. It comprised the following parts: Part (1): socio-demographic data, Part (2): questions that review the students’ exposure to bullying, and Part (3) entails the effects of bullying on those children. Results: The total sample was composed of 410 students; their mean age was 9.51±1.94 years. The prevalence of bullying was 56.34%. Studen
... Show More